HyVulDect: a hybrid semantic vulnerability mining system based on graph neural network

W Guo, Y Fang, C Huang, H Ou, C Lin, Y Guo - Computers & Security, 2022 - Elsevier
In recent years, software programs tend to be large and complex, software has become the
infrastructure of modern society, but software security issues can not be ignored. software …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis

H Wang, Z Liu, S Wang, Y Wang… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Software composition analysis (SCA) has attracted the attention of the industry and
academic community in recent years. Given a piece of program source code, SCA facilitates …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Illuminati: Towards explaining graph neural networks for cybersecurity analysis

H He, Y Ji, HH Huang - 2022 IEEE 7th European Symposium …, 2022 - ieeexplore.ieee.org
Graph neural networks (GNNs) have been utilized to create multi-layer graph models for a
number of cybersecurity applications from fraud detection to software vulnerability analysis …

Api2vec++: Boosting api sequence representation for malware detection and classification

L Cui, J Yin, J Cui, Y Ji, P Liu, Z Hao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Analyzing malware based on API call sequences is an effective approach, as these
sequences reflect the dynamic execution behavior of malware. Recent advancements in …

Towards next-generation cybersecurity with graph AI

B Bowman, HH Huang - ACM SIGOPS Operating Systems Review, 2021 - dl.acm.org
Cybersecurity professionals are inundated with large amounts of data, and require
intelligent algorithms capable of distinguishing vulnerable from patched, normal from …

CroLSSim: Cross‐language software similarity detector using hybrid approach of LSA‐based AST‐MDrep features and CNN‐LSTM model

F Ullah, MR Naeem, H Naeem… - … Journal of Intelligent …, 2022 - Wiley Online Library
Software similarity in different programming codes is a rapidly evolving field because of its
numerous applications in software development, software cloning, software plagiarism, and …

BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries

Y Gu, H Shu, F Kang - Computers & Security, 2023 - Elsevier
Binary code vulnerability detection is an important research direction in the field of network
security. The extensive reuse of open-source code has led to the spread of vulnerabilities …

Non-distinguishable inconsistencies as a deterministic oracle for detecting security bugs

Q Zhou, Q Wu, D Liu, S Ji, K Lu - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Security bugs like memory errors are constantly introduced to software programs, and recent
years have witnessed an increasing number of reported security bugs. Traditional detection …